Skip to content

Best Practices

This guide provides recommendations for maximizing the effectiveness of your WebDecoy deployment.


Deploy multiple layers of decoys:

Layer 1: Visible to crawlers only (robots.txt, hidden links)
Layer 2: JavaScript-accessible (hidden DOM elements)
Layer 3: API honeypots (fake endpoints)
Layer 4: Form honeypots (invisible fields)

Choose paths that attackers target:

Good (realistic):

  • /admin/backup.zip
  • /api/v1/admin/users
  • /wp-config.php.bak
  • /.env
  • /db/export.sql

Bad (obvious):

  • /honeypot.html
  • /fake-admin
  • /trap-page
LocationBest ForExample
robots.txtMalicious crawlersDisallow: /admin-backup/
HTML commentsSource code scanners<!-- backup: /old/admin.zip -->
Hidden linksAutomated crawlersCSS display:none link
Form fieldsSpam botsInvisible website field
API pathsAPI scanners/api/debug, /graphql/admin

Spread decoys across your infrastructure:

AreaDecoys Per AreaPriority
Login/Auth2-3High
Admin areas3-5High
APIs2-4High
Content areas1-2Medium
Static assets1-2Low

Based on what attackers commonly target:

# Admin Discovery
/admin/
/administrator/
/wp-admin/
/admin.php
/manager/
# Backup Files
/backup.zip
/backup.sql
/database.sql
/db_backup.tar.gz
/site-backup.zip
# Configuration
/.env
/config.php
/wp-config.php.bak
/settings.json
/.git/config
# Debug/Test
/debug/
/phpinfo.php
/test.php
/info.php
/.debug
# API
/api/admin/
/api/debug/
/api/config/
/graphql/admin/
/api/v1/internal/

SituationRecommended SensitivityBlock Threshold
High traffic, public siteLow-Medium80-90
E-commerceMedium75-85
Financial servicesHigh70-80
Internal applicationsHigh60-70

Always allow these bot categories:

Search Engines (allow):

  • Googlebot
  • Bingbot
  • Yahoo! Slurp
  • DuckDuckBot
  • Baiduspider
  • YandexBot

Monitoring Services (allow):

  • Pingdom
  • UptimeRobot
  • StatusCake
  • New Relic
  • Datadog

Social Media (allow):

  • Facebook External Hit
  • Twitterbot
  • LinkedInBot
  • WhatsApp

Your Own Bots:

  • Add custom user agents to allowlist
  • Internal monitoring tools
  • Deployment scripts
  • API integrations

Before enabling blocking:

  1. Set to “Log Only” mode
  2. Run for 1-2 weeks
  3. Review detections
    • Identify legitimate traffic being flagged
    • Add to allowlist
  4. Gradually lower threshold
  5. Enable blocking once tuned
FP RateAction
< 1%Good - maintain current settings
1-5%Review allowlists and thresholds
> 5%Lower sensitivity, raise threshold

Periodically check for:

  • Legitimate users with VPNs (common in corporate)
  • Users with strict privacy settings
  • Users from hosting/cloud IPs (developers)

Route detections to appropriate teams:

ScoreRoutingResponse
80-100Security team (immediate)Investigate within 1 hour
60-79Security team (queue)Review within 24 hours
40-59Security monitoringWeekly review
< 40Logs onlyMonthly trends

Send detections to your SIEM for correlation:

Splunk:

sourcetype=webdecoy
| stats count by mitre_tactic, threat_level
| where count > 10

Elastic:

{
"query": {
"bool": {
"filter": [
{ "term": { "source": "webdecoy" } },
{ "range": { "threat_score": { "gte": 70 } } }
]
}
}
}

When high-severity detection occurs:

  1. Assess - Review detection details
  2. Validate - Confirm it’s not a false positive
  3. Contain - Block IP if not already blocked
  4. Investigate - Check for related activity
  5. Document - Record incident details
  6. Improve - Update rules/decoys based on findings
MetricTargetReview Frequency
Total detectionsBaseline + trendDaily
High-severity (80+)MinimizeDaily
False positives< 1%Weekly
Mean time to block< 1 minuteWeekly
Coverage (decoys per area)2-3 per areaMonthly

Regular security reports should include:

Weekly:

  • Total detection count
  • High-severity breakdown
  • New attack patterns
  • Blocked IP count

Monthly:

  • MITRE tactic distribution
  • Geographic trends
  • False positive rate
  • Detection coverage assessment

Quarterly:

  • Year-over-year comparison
  • Attack sophistication trends
  • ROI metrics
  • Recommendations

  • Review and rotate decoys quarterly
  • Update decoy paths based on attack trends
  • Remove unused/expired decoys
  • Document decoy purposes
  • Test decoys after changes
  • Check detection dashboard daily
  • Review high-score detections immediately
  • Set up alerts for critical detections
  • Monitor false positive rate
  • Track detection trends
  • Keep WordPress plugin updated
  • Rotate API keys annually
  • Review integration health monthly
  • Test SSL certificate renewal
  • Update allowlists as needed
  • Use strong, unique API keys
  • Enable two-factor where available
  • Limit API key scopes
  • Review user access regularly
  • Audit integration permissions

ScoreLevelColorAutomatedManual Action
81-100CRITICALRedBlockInvestigate immediately
61-80HIGHOrangeChallenge/BlockReview within 24h
41-60MEDIUMYellowLogWeekly review
21-40LOWBlueLogMonthly trends
0-20MINIMALGreenAllowNo action needed

Small Business Website:

Sensitivity: Medium
Block Threshold: 80
Rate Limit: 60/min
Decoys: 5-10
Bot Scanner: Enabled
Form Honeypots: Enabled

E-commerce Store:

Sensitivity: Medium-High
Block Threshold: 75
Rate Limit: 30/min
Decoys: 15-25
Bot Scanner: Enabled
Form Honeypots: Enabled
WooCommerce Protection: Enabled
Checkout Limit: 5/hour

Enterprise API:

Sensitivity: High
Block Threshold: 65
Rate Limit: 100/min
Decoys: 30+
Bot Scanner: Enabled (high sensitivity)
Endpoint Honeypots: 10+
Cloudflare Integration: Enabled
SIEM Integration: Enabled